LEADER 02399oam 2200505 450 001 9910822716203321 005 20240131143903.0 010 $a0-12-411641-8 035 $a(OCoLC)852159073 035 $a(MiFhGG)GVRL8DGC 035 $a(EXLCZ)992670000000385989 100 $a20130603d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 14$aThe basics of hacking and penetration testing $eethical hacking and penetration testing made easy /$fDr. Patrick Engebretson ; David Kennedy, technical editor 205 $a2nd ed. 210 $aAmsterdam $cSyngress, an imprint of Elsevier$d2013 210 1$aWaltham, MA :$cSyngress,$d2013. 215 $a1 online resource (xviii, 204 pages) $cillustrations 225 0 $aGale eBooks 300 $aIncludes index. 311 $a0-12-411644-2 320 $aIncludes bibliographical references and index. 327 $aWhat is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Web Based Exploitation -- Maintaining Access with Backdoors and Rootkits -- Wrapping Up the Penetration Test. 330 $aThe Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and 606 $aPenetration testing (Computer security) 606 $aComputer hackers 606 $aComputer software$xTesting 606 $aComputer crimes$xPrevention 615 0$aPenetration testing (Computer security) 615 0$aComputer hackers. 615 0$aComputer software$xTesting. 615 0$aComputer crimes$xPrevention. 676 $a005.8 700 $aEngebretson$b Pat$g(Patrick Henry),$f1974-$01596308 702 $aKennedy$b David 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910822716203321 996 $aThe basics of hacking and penetration testing$93917641 997 $aUNINA